Symmetric Encryption: DES and AESExplores DES and AES encryption, discussing weak keys, attacks, AES structure, IV importance, and various modes of operation for secure encryption.
Quantum Random Number GenerationExplores quantum random number generation, discussing the challenges and implementations of generating good randomness using quantum devices.
ECB Penguin and HashingExplores symmetric encryption, social engineering, and secure hashing techniques, focusing on ECB vulnerabilities and SHA-256 usage.